• DocumentCode
    2030261
  • Title

    Intrusion Detection System Modeling

  • Author

    Han, Keesook J. ; Giordano, Joseph

  • Author_Institution
    US Air Force Res. Lab., Rome, NY
  • fYear
    2006
  • fDate
    38869
  • Firstpage
    229
  • Lastpage
    235
  • Abstract
    Database management system (DBMS) controls and manages the data to eliminate data redundancy and to ensure data integrity, consistency and availability, among other features. Even though DBMS vendors continue to offer greater automation and simplicity in managing databases, the need for intrusion database modeling and management practices have not been considered. Our research focuses on not only anomaly detection but also intrusion database management through planning and best practice adoption to improve operational efficiency, lower costs, privacy and security
  • Keywords
    data integrity; data privacy; database management systems; security of data; anomaly detection; data availability; data consistency; data integrity; data redundancy; database management system; intrusion database management; intrusion database modeling; intrusion detection system modeling; Automatic control; Automation; Best practices; Control systems; Costs; Data privacy; Database systems; Intrusion detection; Modeling; Spatial databases;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    HPCMP Users Group Conference, 2006
  • Conference_Location
    Denver, CO
  • Print_ISBN
    0-7695-2797-3
  • Type

    conf

  • DOI
    10.1109/HPCMP-UGC.2006.41
  • Filename
    4134059